General
-
Target
ac3fdb218275ff7609fbca0c02925cc44bfe72ef3a56065f5aa127d74c19bd16
-
Size
1.5MB
-
Sample
201109-v89zxxae7j
-
MD5
10cd65c7d98b8802516694b7a4976ea2
-
SHA1
7917aa791dd23376d69fbdadea5ec13fac90bf19
-
SHA256
ac3fdb218275ff7609fbca0c02925cc44bfe72ef3a56065f5aa127d74c19bd16
-
SHA512
906310440bbf6edccfdd07b862f6c1ded01dc744590621cb67788217c2834b48cae749e700aabadcda29dbc3d98553d71eaf457d804444559974820058266574
Static task
static1
Behavioral task
behavioral1
Sample
ac3fdb218275ff7609fbca0c02925cc44bfe72ef3a56065f5aa127d74c19bd16.exe
Resource
win7v20201028
Malware Config
Extracted
darkcomet
Runescape
mrsnickers03.no-ip.biz:340
DC_MUTEX-6ZFK11A
-
gencode
uNwew4gojxtu
-
install
false
-
offline_keylogger
true
-
persistence
false
Targets
-
-
Target
ac3fdb218275ff7609fbca0c02925cc44bfe72ef3a56065f5aa127d74c19bd16
-
Size
1.5MB
-
MD5
10cd65c7d98b8802516694b7a4976ea2
-
SHA1
7917aa791dd23376d69fbdadea5ec13fac90bf19
-
SHA256
ac3fdb218275ff7609fbca0c02925cc44bfe72ef3a56065f5aa127d74c19bd16
-
SHA512
906310440bbf6edccfdd07b862f6c1ded01dc744590621cb67788217c2834b48cae749e700aabadcda29dbc3d98553d71eaf457d804444559974820058266574
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-